TL;DR
this is a feature request for
a) selectable mount server for Windows FLR
a1) SECURITY: don't ever use VBR server as mount server
Long version
a) mount servers are configured per Repository server (I am convinced this
grouping doesn't make much sense). So in a scaleout repo, we might have a
different mount server configured per scaleout extent. You might run into a
situation where different restore points of the same VM get to reside on
different repo servers (scaleout extents) in the same scaleout repo, and a
restore operation would then use a different one depending on which restore
point from which scaleout extent is to be used.
Worse, if you have an imported restore point (.vbk) that lies on one of your
repo servers, that per-repository setting for mount server is being ignored.
You have no way to manually override the mount server. Instead, the .vbk then
gets mounted to the VBR server itself (compare with Linux FLR: you HAVE TO
manually select a mount server a.k.a helper host a.k.a helper appliance EVERY
TIME). Currently, we have NTFS dedup software components installed only on the
mount server, not on the VBR server. Therefore, we currently cannot access
imported restore points using NTFS dedup unless we also install NTFS dedup
software components on the VBR server itself. I would prefer not to.
According to Veeam Tech Support, this is because an imported backup does not
get assigned a value in the "Repository" field (and you can't supply that field
afterwards). They don't think this to be a bug, they claim it is "expected
behaviour".
I beg to differ

-----------------------------------------------------------------------
a1) on the VBR server, you deposit the most precious credentials of all your
network: vSphere admin credentials, storage admin credentials, Windows
credentials to get "Local Administrator" rights for FLR, Linux credentials to
get "root" for FLR. I probably have missed some categories. These credentials
get to be used by the VBR server automagically, even across reboots, without
anyone providing a passphrase or something similar for this collection of
credentials. So while they might be stored on the VBR server's disk in some
obfuscated way, they are not effectively encrypted. For Windows FLR, under
circumstances described above (and possibly in other cases, too), the VBR
server itself gets to do the filesystem mounting for the selected restore
point. From a security standpoint, the virtual disk images of a restore point
must be viewed as attacker-controlled material. Now mounting a filesystem
(no matter the noexec or readonly options) is a kernel-level activity (I assume
Veeam did not re-implement this in user space). Any (Windows-based)
vulnerability there might then yield kernel-level access to the attacker,
allowing him to grab all those (obfuscated, not effectively encrypted)
credentials and to use them for fun and profit. Now you might be inclined to
do some finger-pointing towards some bad security of the original VM that got
hijacked in the first place or towards Microsoft for some stupid kernel-level
bug. But essentially this is Veeam ignoring Defense in Depth design principles.
Veeam Tech Support's assessment instead claims that everything is fine
security-wise the way it currently is.
I beg to differ
